Audit Trail
A record showing who has accessed a computer system and what operations he or she has performed during a given period of time. Audit trails are useful both for maintaining security and for recovering lost transactions. Most accounting systems and database management systems include an audit trail component. In addition, there are separate audit trail software products that enable network administrators to monitor use of network resources.
Read Also:
- Authentication
The process of identifying an individual, usually based on a username and password. In security systems, authentication is distinct from authorization , which is the process of giving individuals access to system objects based on their identity. Authentication merely ensures that the individual is who he or she claims to be, but says nothing about […]
- authenticity
In social media, authenticity is the word used to describe “real” people behind blog posts and other social profiles that can develop an authentic voice with readers and followers.
- Authoring Tool
Also known as authorware, a program that helps you write hypertext or multimedia applications. Authoring tools usually enable you to create a final application merely by linking together objects, such as a paragraph of text, an illustration, or a song. By defining the objects’ relationships to each other, and by sequencing them in an appropriate […]
- authorization
The process of granting or denying access to a network resource. Most computer security systems are based on a two-step process. The first stage is authentication, which ensures that a user is who he or she claims to be. The second stage is authorization, which allows the user access to various resources based on the […]
- Auto ID
Short for automatic identification, Auto ID is the term used to describe the process of automatic data collection and identification that occurs in real-time. Bar code technology is considered to be a type of Auto ID.